9
CVSSv2

CVE-2020-1956

Published: 22/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache kylin

apache kylin 3.0.0

apache kylin 3.0.1

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [CVE-2020-1956] Apache Kylin command injection vulnerability <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Geor ...

Github Repositories

CVE-2020-1956

CVE-2020-1956 CVE-2020-1956 Apache Kylin exploits Kylin 230-232,Kylin 240-241,Kylin 250-252,Kylin 260-265,Kylin 300-alpha,Kylin 300-alpha2,Kylin 300-beta,Kylin 300-301 and admin competence